Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Let’s Look to the Future, Shall We?

  Presented by INTERFACE Advisory Council

You were ready for a power outage. Cooling equipment has worked properly in your server room or data center. You had plenty of backup in the cloud and you felt good about your BC/DR plan, until a pandemic hit. The sudden shift to remote working for many industries forced rapid change for IT staffs to keep businesses functional. Some of these changes were temporary, while some were longer lasting.

Join the INTERFACE-New Mexico Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? The dreaded elephant in the room will be addressed as well – BUDGETS! What do you need? What is expected of your IT staff? You will get tips on what has worked and what still is a challenge in keeping your users active and ensuring your business is fully operational.


Panelists:


Aaron Frankel • Chief Information Security Officer, Tricore Reference Laboratories
Jason Johnson • Deputy State CIO, State of New Mexico
Spencer Wilcox • Chief Security Officer and Executive Director of Technology, PNM Resources

Work from Anywhere: The New Norm For Public Sector

  Presented by Nutanix

As we have seen in 2020, many companies are working to enable their employees to have a work from home capability. However, there are many factors that contribute to whether that will be possible or not. Are their apps supported? What devices are supported? How secure will they be? What latency issues will they incur and where is the data locality?

All of these topics and more will be addressed.

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

Do You Know What is Plugged in to Your Networks, Data Centers & Clouds?

  Presented by Check Point

The connected network is undergoing significant transformation! A proliferation of connected Smart IOT devices for (in)security cameras, building management, Audio/Video Systems, Printers, Badge Readers and Access Points are just some of the IOT devices on all of our networks. Let alone the industry specific connected devices across manufacturing, healthcare, SCADA and other verticals which have their own alphabet soup of IOT and MOT assets. The Intelligent network must be able to identify, classify and integrate with the networks, security controls and data center deployments to securely allow the whitelisted application flows, while blocking unauthorized and malicious traffic. This challenge is amplified in that many of the applications which used to live inside of our physical data centers have migrated to the cloud or Software as a Service offerings requiring Smart IOT devices needing access to internet and cloud resources. Without proper security controls in place, IOT devices can and will be an entry point of malware infection and breach of our computer networks. Tools do exist allowing for dynamic profiling and monitoring of our physical and virtual network giving visibility and access controls back into the hands of IT. In this Session you will learn strategies & best practices for actively monitoring and enforcing dynamic access controls on the network with automated integrations across network & security controls.

Virtual Desktops & Virtual Applications: What’s New

  Presented by IVOXY Consulting & NetApp

Over the last year we have witnessed tremendous growth in the virtual desktop/virtual application segment, as a significant number of organizations began to work remotely. VDI has replaced traditional VPN technology, providing a faster, more seamless experience for the end-user, while reducing administrative overhead for their IT support team.

In this seminar Alec will catch you up on the latest advancements in virtual desktop technology, as well as dive into what’s new in the virtual applications space. From rapid provisioning to self-service provisioning, we have you covered!